Cyber Security Generals!

TorCoin- New CryptoCurrency

June 7, 2014

Researchers from Yale have designed  an alternate Torcoin that will overcome the problem of Bitcoin. As per them, is an alternative cryptocurrency, or altcoin, based on the Bitcoin protocol . Unlike Bitcoin, its proof-of-work scheme is based on bandwidth rather than computation. To “mine” a TorCoin, a relay transfers bandwidth over the Tor network. Since [...]

Read the full article →

The Pervasiveness Of The Homomorphic Encryption

January 16, 2013

Until now,data can be sent to and from a cloud provider’s data center in encrypted form, the servers that power a cloud can’t do any work on it .There too much of a security risk is available if  service providers are given access to unencrypted data. With homomorphic encryption, a company could encrypt its entire [...]

Read the full article →

TOP 10 Best Security Practice For Cloud Environment

October 26, 2012
Thumbnail image for TOP 10  Best Security Practice For Cloud Environment

                        photo :FutUndBeid Privacy is a major concern for any organization using the cloud.  This write up  will help you to follow best practice that are must in Cloud Environment. Empaneling  of the  service provider who can guarantee the highest level of uptime. Always [...]

Read the full article →

Wikileaks and Anonymous rolled up their sleeves

October 11, 2012

Anonymous is typically a big fan of Wikileaks and its founder, Julian Assange, but earlier today, several of its members sent out tweets calling for people to stop donating to the site until further notice. Click here for full article c|net

Read the full article →

Samsung Galaxy S3 remote data-wipe hack

September 25, 2012
Thumbnail image for Samsung Galaxy S3 remote data-wipe hack

          photo:grapegeek Ravi Borgaonkar , security researcher has demonstrated a simple attack that could lead to a remote wiping of some Android-based Samsung smart phones.The reset to the factory settings and complete wipe of the contents is achieved via a simple USSD (Unstructured Supplementary Service Data) code delivered to the device [...]

Read the full article →

Myth Related To Application Security

September 21, 2012
Thumbnail image for Myth Related To Application Security

Photo credit: The.Handicapped.Stall   Myth #1: Secure Socket Layer (SSL) Will Secure My Website SSL does NOT make a website secure. The tiny SSL lock symbol located at the bottom of a Web browser indicates that the information sent to and from a website is encrypted. Secure Socket Layer (SSL) is an encryption protocol that enables a website to prove to a user that if someone intercepts the conversation between the user and the website, the exchange cannot be read. SSL has absolutely no impact on website security or the manner in which a user’s private information is safeguarded. When private data are stored on the website, the risk is at the server level. Myth #2: Firewalls Protect Against Website [...]

Read the full article →

India Ranked 1 In Spam-relaying Countries.

July 26, 2012

India  ranked 1 in world’s biggest fire hose of spam email, according to new figures. Hacked computers in the republic working on behalf of crooks spewed more than one in ten of the globe’s spam mails in the last quarter, reported web security firm Sophos.India is home to 5.3 per cent of the world’s internet [...]

Read the full article →

1700 Wireless Patents Sold To Intel

June 19, 2012
Thumbnail image for 1700 Wireless Patents Sold To Intel

NEW YORK (Reuters) – InterDigital Inc said on Monday it had agreed to sell to Intel Corp about 1,700 wireless technology patents for $375 million, sending InterDigital shares up 27 percent. While Intel is pushing to expand its chip business beyond computers and into mobile devices, InterDigital for about a year has been seeking to [...]

Read the full article →

Top Trending Android Malwares

June 10, 2012

According to the McAfee Threats Report: First Quarter 2012.The great majority of mobile attacks, and their malware, stem from and attack third-party markets, particularly in China and Russia. In most cases, we do not find this malware in the official Android market. Google’s app store has suffered from some incidents, but so far those counts [...]

Read the full article →

Anonymous hacktivists plans for a protest in India

June 1, 2012
Thumbnail image for Anonymous hacktivists plans for a protest in India

The Hacktivist group Anonymous is planning demonstrations in 11 cities on June 9 2012 for restoring internet freedom. This protests is  over blocking of websites . Recently,users connected to the web through the network provided by Reliance Communications (RCom) could not access popular websites like Twitter and Facebook on 26th May  morning after hackers allegedly [...]

Read the full article →